25
25
Jun 21, 2016
06/16
by
Erik McClanahan & Joe von Appen
audio
eye 25
favorite 0
comment 0
This week, Joe and Erik get back to the heavily segmented shows of AYT past, filling up this episode with a wide range of topics. There’s an opening look back at the Summer that was this year, then we segue into an addendum to our last episode where we discuss the recent news of Quentin Tarantino taking over as programmer at his New Beverly Cinema in LA. After that, it’s on to a good ol’ fashioned review of a new, must-see film called Starred Up . Lastly, we dust off our...
Topics: A Prophet, A24, Amazon Prime, An Innocent Man, Ben Mendelsohn, Bojack Horseman, Bronson, Crackle,...
Sermons & Religious Lectures
48
48
Jul 24, 2011
07/11
by
Rev. Darrin Waldroup, Bethel Missionary Baptist Church
audio
eye 48
favorite 0
comment 0
The Devices Of The Enemy
Topic: The Devices Of The Enemy
4
4.0
movies
eye 4
favorite 0
comment 0
Final 1on1 Battle on Wolfenstein Enemy Territory between Mxt0r and Damon, end of the maps and match.
Topics: Mxt0r, Damon, Mxt0r vs Damon, Wolfenstein Enemy Territory, Mxt0r 1on1, Damon 1on1, te_valhalla
35
35
audio
eye 35
favorite 0
comment 0
Concierto de los escoceses Hey Enemy en el kasal de roquetes
Topics: Hey, Enemy, Live
4
4.0
movies
eye 4
favorite 0
comment 0
Professor Tsuyoshi Hasegawa talks about his book, "Racing the Enemy: Stalin, Truman, and the Surrender of Japan", in which he looks at the standard history of the end of World War II from a larger international perspective
Topics: Book Discussion on Racing the Enemy, Television Program
Source: Comcast Cable
0
0.0
movies
eye 0
favorite 0
comment 0
CNN's Chief White House correspondent Jim Acosta offered his first-hand account of covering the Trump Administration. He's interviewed by Jay Rosen, founder of PressThink and New York University journalism professor. Sponsor: C-SPAN | Book TV
Topics: After Words Jim Acosta, "The Enemy of the People", Television Program
Source: Comcast Cable
0
0.0
movies
eye 0
favorite 0
comment 0
CNN's Chief White House correspondent Jim Acosta offered his first-hand account of covering the Trump Administration. He's interviewed by Jay Rosen, founder of PressThink and New York University journalism professor. Sponsor: C-SPAN | Book TV
Topics: After Words Jim Acosta, "The Enemy of the People", Television Program
Source: Comcast Cable
Amirca Biggest Enemy Of Muslims,pdf Arabi
Topics: Amirca Biggest Enemy Of Muslims, pdf Arabi, dr aiman
11
11
Sep 17, 2014
09/14
by
Funny or Die
movies
eye 11
favorite 0
comment 0
Hobbies: Your Worst Enemy! Conrad takes an unflinching look at the sad world of hobbyists! You will wish he had flinched!
Topics: Funny or Die Video Archive, The Sad, What's It Gonna Be, conrad, conrad besselheimer, enemy, hobby,...
7
7.0
Sep 21, 2014
09/14
by
Funny or Die
movies
eye 7
favorite 0
comment 0
marine laughing himself silly wile having wound treeted
Topics: Funny or Die Video Archive, New Enemy, milatary
20
20
Mar 25, 2009
03/09
by
Boggs
audio
eye 20
favorite 0
comment 0
2 ladies in North Korea, and we are their enemy
Topics: enemy, economy, Cheney, bad, boy, Korea
334
334
Sep 7, 2008
09/08
by
Ohio Antietam Battlefield Commission , David Cunningham , Wells W. Miller
texts
eye 334
favorite 1
comment 0
Book digitized by Google from the library of the University of Michigan and uploaded to the Internet Archive by user tpb.
Topics: ohio, regiment, antietam, battle, battlefield, general, enemy, monuments, infantry, colonel,...
Source: http://books.google.com/books?id=d5UBAAAAMAAJ&oe=UTF-8
4
4.0
movies
eye 4
favorite 0
comment 0
Concepts # 11 The Near Enemy
Topic: Concepts # 11 The Near Enemy
Having confidence in times of trouble
Topics: Jesus, God, Fear, Storm, Confidence, Enemy, Flood, Standard
Image Computer Products Catalog (19xx)(Image Computer)
Topics: players, computer, strategy, player, simulation, game, enemy, pack, numbers, bomber, action pack,...
Split jams
Topics: Human Waste, Your Enemy
To sustain itself as the world's premier land power, the U.S. Army needs the capability to support expeditionary forces by projecting a minimal basing footprint with reduced logistical burdens. Strategically sited contingency bases (CBs) allow the Army's expeditionary forces to rapidly respond throughout a joint area of operations. To assist with this goal, the Army is funding work in the Engineer Site Identification for the Tactical Environment (ENSITE) program, which is dedicated to...
Topics: DTIC Archive, Cegan,Jeffrey C, ENGINEER RESEARCH AND DEVELOPMENT CENTER CHAMPAIGN IL CHAMPAIGN...
The Automated Reconnaissance and Surveillance, (R and S) Planning Tool is a prototype of the Army's proposed Common Ground Station, and serves as a Intelligence interface to NPSNET. This system incorporates Intelligence Preparation of the Battlefield (IPB) and intelligence asset modeling in order to create realistic intelligence collection. IPB is the analysis of the affects of the terrain, weather, and enemy doctrine on the friendly situation. Intelligence System Modeling is performed for...
Topics: DTIC Archive, Weigeshoff, William R, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *INTELLIGENCE,...
This study examines the Allied evacuation of 130,000 men, nearly 10, 000 animals, and huge quantities of weapons and equipment from the Gallipoli Peninsula in 1915. A synopsis of the eight months preceding the evacuation illustrates the myriad problems facing the Allies during the ill-fated campaign to secure the Dardanelles straits. The study analyzes the decision to evacuate and the subsequent planning, preparation, and execution of the amphibious withdrawal. The Allies were able to conduct...
Topics: DTIC Archive, Lawless, Keith A, ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS,...
This study develops a planning methodology to enhance the current procedure for analyzing friendly courses of action (COAs). It will particularly enhance the way we consider enemy uncertainty during planning. Operations planners do not always account for possible enemy reactions rigorously when formulating friendly COAs. To overcome this, the study proposes to make the consideration of enemy options a more integral part of the planning methodology. The planning methodology we propose is built...
Topics: DTIC Archive, Ng, Kok W., ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS, *TREES,...
This manual provides technical information on the identification, care, handling, and use of land mines in Federal supply classification (FSC) 1345 and their components. It also provides general technical information on items from other FSC classes which are used with these land mines. Chapter (1) outlines the manual and provides general information on the types of mines, complete rounds, explosive trains, classification, identification, care, handling and preservation, storage, packing and...
Topics: DTIC Archive, DEPARTMENT OF THE ARMY WASHINGTON DC, *USER MANUALS, *LOGISTICS MANAGEMENT, *LAND...
As the United States military enters the 21st century, the exponential advances of the Information Age will fundamentally transform the nation's operational warfighting capabilities, not through technical innovation, but rather in the dynamic transformation of command and control practices and organizational structures. Historically, decisive technological advances are a temporary phenomenon. Therefore, the state that is able to leverage technical advances with innovative command and control...
Topics: DTIC Archive, Frank, Patrick D, NAVAL WAR COLL NEWPORT RI, *MILITARY OPERATIONS, *COMBAT READINESS,...
DIAMOND (Diplomatic And Military Operations in a Non-warfighting Domain) is a high-level stochastic simulation program developed at Defence Science and Technology Lab, Analysis, as a key centerpiece within the Peace Support Operations (PSO) modeling jigsaw. The program is designed to examine the utility of military force elements and equipment, the effectiveness of future force structures, and possible outcomes of different operational strategies within PSO. It represents the differing parties...
Topics: DTIC Archive, Bailey, Peter W, DEFENCE SCIENCE AND TECHNOLOGY LAB FARNBOROUGH (UNITED KINGDOM),...
The U.S. Air Force faces the distinct possibility that its bases may be vulnerable to enemy attack. Combat fatigue may thus affect nonfliers, whereas in past conflicts fliers have been the ones affected. This report reviews the literature on the effects of combat: first on fliers, then on nonfliers. The report suggests that flight surgeons use 2 main agents of therapy, rest and the force of their personality, to delay or prevent combat fatigue in fliers. The report also discusses the relevant...
Topics: DTIC Archive, Jones,David R, SCHOOL OF AEROSPACE MEDICINE BROOKS AFB TX, *PILOTS, *FATIGUE,...
The Airborne Low Frequency Sonar system is being designed to provide a long-range active search capability to detect, localize, and classify sub-surface threats. The sonar is a dipping sonar, which is an acoustic sensor that is lowered into the water from a helicopter, searches for submarine sounds, and then is raised back into the helicopter by cable. The sounds detected by the sonar are analyzed by an acoustic processor on board the helicopter. This system can also process and display data...
Topics: DTIC Archive, GENERAL ACCOUNTING OFFICE WASHINGTON DC NATIONAL SECURITY AND INTERNATIONAL AFFAIRS...
Maritime Prepositioning Forces (MPFs) are an effective and efficient means for Commander in Chief, Central Command (CINCCENT) to achieve national security and military strategy objectives in his area of operations (AOR) in the 1990s and beyond, provided they are properly deployed and employed. The MPF concept was validated during Desert Shield/Storm, as a complement to, not a substitute for, amphibious operations, providing the CINC expeditionary flexibility and employment sustainability....
Topics: DTIC Archive, Decamp III, William T, NAVAL WAR COLL NEWPORT RI DEPT OF OPERATIONS, *MILITARY...
28
28
Sep 5, 2014
09/14
by
Funny or Die
movies
eye 28
favorite 0
comment 0
What happens behind the scenes on the set of a Middle Eastern hostage video?
Topics: Funny or Die Video Archive, Behind the Scenes, Funny video, Middle East, Middle Eastern, The Enemy,...
This paper examines Operation Overlord and deception plan Bodyguard--the deception that made the Allied invasion of Europe in WWII so successful. First, the paper advocates why deception planning should be pursued, in spite of American inclinations not to, by examining the direct benefits deception provided to the success of Overlord. This paper is not a comprehensive A to Z examination of the tenets of deception. Instead, it more closely examines only two aspects of deception: the dynamics of...
Topics: DTIC Archive, Terrell, Richard L, NAVAL WAR COLL NEWPORT RI JOINT MILITARY OPERATIONS DEPT,...
President Bush has consistently articulated his administration's policy to seize the initiative and utilize all elements of national power, including armed force, to combat terrorists and the nations that harbor them. The dialogue on the 'legality' of striking Iraq as a threat to this country's vital interests as a result of its pursuit of weapons of mass destruction resounds in the media. However, there is significantly less discussion on the lawfulness of striking the terrorist groups which,...
Topics: DTIC Archive, Mangum, Kevin W, ARMY WAR COLL CARLISLE BARRACKS PA, *TERRORISM, *INTERNATIONAL LAW,...
The Supreme Court in 2004 issued three decisions related to the detention of enemy combatants, including two that deal with U.S. citizens in military custody on American soil. In Hamdi v. Rumsfeld, a plurality held that a U.S. citizen allegedly captured during combat in Afghanistan and incarcerated at a Navy brig in South Carolina is entitled to notice and an opportunity to be heard by a neutral decisionmaker regarding the government's reasons for detaining him. The Court in Rumsfeld v. Padilla...
Topics: DTIC Archive, Elsea, Jennifer K, LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE,...
This paper documents an effort to specify requirements for stronger cognition -- comprehension, reasoning, and decision making -- in 21st-century counterinsurgency (COIN). Unlike information technology (e.g., sensors, chat rooms, displays), cognition is what occurs between the ears after receiving information. It is as crucial to COIN as physical capabilities, organizational structures, and territorial control. Greater attention to cognitive capabilities is dictated by the rise and persistence...
Topics: DTIC Archive, Gompert, David C, RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA, *MILITARY...
The New York City Fire Department, like the entire fire service, has been proven to be a primary stakeholder in Homeland Security. The mindset of firefighters is influenced by traditional and expected roles that are not fully considerate of the challenges accompanying the new enemy of terrorism. A fundamental deficiency is herein identified as the manner in which information is managed. The FDNY must adapt so as to recognize information as an entity that must be collected, saved and utilized...
Topics: DTIC Archive, Flynn, John P, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF NATIONAL SECURITY...
Iraq s chemical, biological, and nuclear weapons programs, together with Iraqi long-range missile development and support for al-Queda terrorism, were the primary justifications put forward for military action. On March 17, 2003, President Bush issued an ultimatum demanding that Saddam Hussein and his sons depart from Iraq within 48 hours. On March 19, offensive operations began with air strikes against Iraqi leadership positions. By April 15, after 27 days of operations, coalition forces were...
Topics: DTIC Archive, Bowman, Steve, LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE,...
For the United States to maintain its position as a hegemon, to increase its technological superiority to counter any enemy, and to meet the requirement to fight any enemy, anywhere, anytime, the Department of Defense (DoD) must revamp the policies and procedures currently in place. DoD must ensure that it has the right mix of scientific and engineering personnel to manage the acquisition system, must invest in basic technologies, must use modern management practices to mitigate financial risk,...
Topics: DTIC Archive, Coombs, Christopher M, AIR WAR COLL MAXWELL AFB AL CENTER FOR STRATEGY AND...
The Defense Science Board task force assessed the Department of Defense's (DoD) dependence on software of foreign origin and the risks involved. The task force considered issues with supply chain management; techniques and tools to mitigate adversarial threats; software assurance within current DoD programs; and assurance standards within industry, academia, and government. This executive summary highlights the future U.S. ability to ensure and maintain a trusted supply of software to the DoD...
Topics: DTIC Archive, DEFENSE SCIENCE BOARD WASHINGTON DC, *COMPUTER PROGRAMS, *OFF THE SHELF EQUIPMENT,...
On July 12, 2006, Israel went to war with Hezbollah in response to the killing and capture of Israeli soldiers along the southern Lebanese border. Believed at the time by many in the West to be an overreaction to a relatively minor border incident resulted in hundreds of civilian deaths in Lebanon, the displacement of hundreds of thousands of civilians on both sides of the border, and the deaths of dozens of Israeli soldiers and civilians. More important to Israeli nation security, the war...
Topics: DTIC Archive, ARMY COMMAND AND GENERAL STAFF COLL FORT LEAVENWORTH KS, *MILITARY OPERATIONS,...
2/11/18 p.m. sermon Speaker: Justin P. Sivley We are at war! And our enemy is a powerful one. We must be prepared for the fight. One way we prepare is by understanding our enemy, which we will attempt to do in this lesson.
Topics: Christianity, Bible, Ephesians, Satan, Enemy, New Testament, Sermon
"Overcoming the Enemy" by Patrick Killingsworth on 6/22/2008 at Living Water Ministry in Dallas, Georgia.
Topics: overcoming the enemy, Patrick Killingsworth, Living Water Ministry
Sermon Two on Nehemiah - Preparation - chapter one and two
Topics: broken walls, boundaries, bonding, prayer, faith and works, vision, leadership, fighting the enemy
Dangers of Christians being distracted, the message being distorted, plus being led into deception - and how to protect yourself from these.
Topics: Danger, Distraction, Distortion, Truth, Jesus, God, Church, Satan, Enemy, Attack
258
258
Nov 20, 2012
11/12
by
GameSparked
audio
eye 258
favorite 0
comment 0
It's a big week this week for The GameSparked Podcast! Tune in for Joe's excited ramblings on XCOM: Enemy Unknown and Don't Starve as well as his experiences on his trip to see The Man with the Iron Fist with Myles earlier this week. Mat checks in with us as he says goodbye to his Wii with an unexpected classic before saying hello to the brand new Wii U with the help of Scribblenauts Unlimited, ZombiU, Nintendo Land, and New Super Mario Bros. U, as well as dipping into Call of Duty: Black Ops 2...
Topics: black ops 2, call of duty, don't starve, enemy unknown, epic mickey, new super mario bros u,...
This is an impactful message of how the enemies faith can empower us to fight back!
Topics: God, faith, Jesus, enemy, battle, Pastor, Message, Sermon
A Bible sermon preached by Jarrod Jacobs on Sunday PM, 6/24/2012. In this sermon, we talk about how men have struggled through the years. At the same time, we present the temptation to think the "other side" is better. However, this is not the case. It is always best to do the Lord's will and then struggle through whatever man and Satan may throw at you.
Topics: God, Jesus, Christ, Holy Spirit, Bible, Book, Word, Truth, Scripture, Old Testament, New Testament,...
7
7.0
Feb 13, 2016
02/16
by
Kenneth Udut
movies
eye 7
favorite 0
comment 0
If the #idea of being #nobody to some #ppl REALLY bothers you, you can become everybody's #friend - or their #enemy - but that has costs. -iJhIjTBlMH9
Topics: people, force, adversary, soul, line, design, commoner, commoner, common person, associate, aim,...
Characteristics of Theater: In order to make the necessary informational for planning available as early as practicable and because lack of time does not permit inclusion of more than essential information for conduct of the operation, ANNEX A, has been printed and distributed in sections with references, insofar as practicable, to publications and maps of general distribution. Information available to the date of printing-- hydrographic, topographic defense installations and enemy...
Topics: DTIC Archive, WESTERN NAVAL TASK FORCE SICILY (ITALY), *ITALY, *MILITARY OPERATIONS, *MILITARY...
Lawfare is defined in various ways, but it is essentially a way to describe legal activities within the context of armed conflict. The Army s operational concept provides a framework within which to conceptualize offensive lawfare which, in the current global counter-insurgency conflict, should be understood to include efforts to deny enemy forces sanctuary, to blunt their abuse of courts, and to use both foreign and domestic courts to better support our national security strategy. Policy...
Topics: DTIC Archive, ARMY WAR COLL CARLISLE BARRACKS PA, *COUNTERINSURGENCY, *LAW ENFORCEMENT, *TERRORISM,...
Throughout the seventeenth, eighteenth, and nineteenth centuries, Native American intertribal warfare across North America was common and intense. Apart from fighting over land and resources in conflict that could be marked by generally small-scale but nevertheless intense destructiveness over time, these tribes often attached immense importance to prestige and status. How one tribe stood in relationship to another was considered of great significance. In some instances, raids consisted solely...
Topics: DTIC Archive, AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST, *AIR FORCE PERSONNEL, *WARFARE, AIR...
This Instruction; reissues reference (a) DoD Directives 1340.9, under the authority delegated in reference (b). Deputy Secretary of Defense memorandum, updates policy, responsibilities, and procedures governing the administration of special pay for duty subject to hostile fire or imminent danger.
Topics: DTIC Archive, ASSISTANT SECRETARY OF DEFENSE (FORCE MANAGEMENT AND PERSONNEL) WASHINGTON DC,...
Intelligence analysts, long neglected by the technology driven USAF, must be resurrected as the human link between operational decision makers and the impersonal intelligence process which supports them. Commanders at squadron, wing, numbered air force, and major command levels want knowledgeable analysts to represent the enemy on their staffs. This requires fundamental changes in USAF Intelligence focus, force structure, training, education, and career management.
Topics: DTIC Archive, Whitten, Kathy S, AIR WAR COLL MAXWELL AFB AL, *MILITARY INTELLIGENCE, *ANALYSTS,...
German military leadership during World War II is generally recognized for their exceptional performance in the operational and tactical levels of war. During the first nine months of the war, Germany successfully completed three separate major operations defeating France, Luxembourg, Belgium, Holland, Denmark, Norway, and Poland. Yet, despite these successful operations and Germany's continuing maritime interdiction operations they were not able to defeat their only remaining adversary in the...
Topics: DTIC Archive, Drake, Fred P., Jr, NAVAL WAR COLL NEWPORT RI JOINT MILITARY OPERATIONS DEPT,...